Skip to content
The SECOND Advisories Limited
Your Trusted Cybersecurity Advisor
Home
Blog
What;s New
Contact
Resources
Cybersecurity is neither product nor solution.
It is a never-ending journey with ongoing challenges to reach the rolling target of stakeholders expectation.
Automation is everywhere, be seen or behind the scene.
Cybersecurity becomes everyone's concern and therefore everyone's responsibility.
Critical Infrastructure Failure Has High Impact.
They must be secured to maintain reliable services.
Systems are no longer deployed as islands.
They are connected and accessible anywhere, anytime, any network, any device and any platform.
And so are people getting connected.
... mostly in the cyber world, even when face-to-face.
Cloud, Social Network, IM, AI are dominating.
Demarcation of biz and non-biz use, trusted and untrusted app are diminishing.
We are living in real and cyber space.
... always exposing to threats and must follow the same risk-taking principles for cost-effective and optimal protection.
Hackers are all around.
Be vigilant and smart to avoid being victim.
Collect latest cyber threat intelligence.
But assess material impacts to specific business environment by competent cybersecurity practitioners to avoid FUD.
Prepare for the worst.
React promptly to resume services to maintain survivability.
Streamlined IR is the bottom line.
Because we don't know what threats we don't know.
Engage all levels.
Ask what you can do for cybersecurity.
Be part of the transformation.
Each of us plays a different roles to protect the cyber community.
Cybersecurity is needed for all entity size.
... as mutual protection for individual and connected neighbor.
Act now and don't wait.
Are you ready for this journey and explore with us?
Services
Provide vendor neutral cybersecurity advisories to enhance the organization cybersecurity posture Act as a trusted...
Gallery
Slipping away for a break from cybersecurity conference / event (alphabetic order). Non-Cyber – Travel
About
Founded in 2016 ... Subject Matter Expert of cybersecurity in ICT (Information and Communications Technology) and ICS (...
Dormant
Malware nowadays is getting sophisticated - has small footprint, evade sandbox & detection, determine platform to inject the applicable payload,
Deep Packet Inspection (DPI)
As cyber attacks have already moved from network layer to application tier, DPI is a must to examine contents to
Expectation & Limitation
Every technology has its own limitation. Don't just listen to Sales or look at Product Brochure. Their tactics are to
Point of Attraction
Everything has multiple perspectives. A point of attraction could become the point of attack. Example is setting up web site
Retrofit
Three scenarios: (a) fix design flaw to make system secure, (b) address new vulnerabilities that are unknown before, or (c)
Trust #2
When Internet is just launched to the consumer market, it's costly. Need to subscribe the service from your local Internet
Shoulder Surfing
No matter how the end point is secured, a careless end user will nullify all the deployed counter-measures like MDM
Trust
When you come across a free USB socket to charge your mobile device, will you trust and use it? You
Real Image
Virtualization is great technology deployed in ICT (or even ICS). There are many merits for live system or application development
Technology
Technology helps avoiding mistake, operating continuously and enforcing certain outcome. However, technology is designed and deployed by human. There must
Manual Control - Rare to Find
Yes, it is and mostly replaced by automation which is everywhere nowadays: Be seen like car park entry/exit control, house
Policies #4
In stipulating policies (written management directives), the hard part is in the language for having specific objective with flexibility and
« Previous
1
…
13
14
15
16
17
…
23
Next »